Hacker News new | past | comments | ask | show | jobs | submit login

Is that still true when you control the source code and compiler? Or just for external researchers?



It’s not that reverse engineering is the challenge but that the exploit likely gets downloaded from a server that isn’t online anymore.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: